1 |
G. Neumann and M. Strembeck, "An approach to engineer and enforce context constraints in an RBAC environment," in Proceedings of 8th ACM Symposium on Access Control Models and Technologies (SACMAT '03), pp. 65-79, Como, Italy, June, 2003.
|
2 |
Financial Services Commission, Study on the introduction of the block chain technology financial sector. Corda platform. https://www.r3.com, 2016.
|
3 |
Seung-Hyun Kim, Soohyung Kim. "Analysis of Blockchain-based Access Control Technology," [ETRI] Electronics and Telecommunications Trends, pp. 117-128, 2019.
|
4 |
YOSEMITE Public Blockchain, Technical White Paper (KOR version), 2018. 02
|
5 |
K. Christidis and M. Devetsikiotis, "Blockchains and smart contracts for the internet of things," IEEE Access, vol. 4, pp. 2292-2303, 2016.
DOI
|
6 |
G. Sagirlar, B. Carminati, E. Ferrari, J. D. Sheehan, and E. Ragnoli, "Hybrid-iot: Hybrid blockchain architecture for internet of things-pow subblockchains," arXiv preprint arXiv:1804.03903, 2018.
|
7 |
S. H. Yang, "Proposal for Smart Contract method for domestic medical system based on the colored coin," Department of Convergence Service Security Engineering, Master dissertation. Soonchunhyang University, Asan, 2017.
|
8 |
Sang-Soo Yeo, Si-Jung Kim, Do-Eun Cho, "Dynamic Access Control Model for Security Client Services in Smart Grid," International Journal of Distributed Sensor Networks, June 2014.
|
9 |
Y. J. Huh, "A IoT control system that provides Authentication, Non-repudiation and Integrity Using a blockchain," Graduate School of Electronic Engineering, Master dissertation. Sogang University, Seoul, 2017.
|
10 |
Z. Zheng, S. Xie, H. N. Dai, and H. Wang, "Blockchain challenges and opportunities: A survey," Work Pap, 2016.
|
11 |
Ik-Soon Kim, "Survey on Smart Contract Programming Languages," [ETRI] Electronics and Telecommunications Trends, 35(5), pp. 134-138, 2020.
|
12 |
Sayeed, Sarwar & Marco-Gisbert, Hector & Caira, Tom. Smart Contract: Attacks and Protections. IEEE Access. pp. 1-1, 2020.
|
13 |
http://wiki.hash.kr/index.php/%EC%8A%A4%EB%A7%88%ED%8A%B8_%EA%B3%84%EC%95%BD
|
14 |
R. S. Sandhu, E. J. Coyne, H. L. Feinstein, and C. E. Youman, "Computer role-based access control models," Computer, vol. 29, no. 2, pp. 38-47, 1996.
DOI
|
15 |
Young-Hun Kim. (2019). "A Study on Smart Contract for Personal Information Protection," Journal of Digital Convergence, Vol. 17. No. 3, pp. 215-220, 2019.
DOI
|
16 |
Andres Guadamuz & Chris Marsden, Blockchanins and Bitcoin: Regulatory Responses to Cryptocurrencies, First Monday-Peer Reviewed Journal on The Internet, 20(12), 2015. https://firstmonday.org/article/view/6198/5163
|
17 |
Szabo, Nick, The idea of smart contracts. Nick Szabo's Papers and Concise Tutorials, 1997.
|
18 |
Gartner Identifies the Top 10 Strategic Technology Trends for 2018. https://www.gartner.com/newsroom/id/3812063
|